0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Online Business Security Systems (Hardcover, 2007 ed.): Godfried B. Williams Online Business Security Systems (Hardcover, 2007 ed.)
Godfried B. Williams
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Multirate Systems - Design and Application (Hardcover, illustrated edition): Multirate Systems - Design and Application (Hardcover, illustrated edition)
R1,999 Discovery Miles 19 990 Ships in 18 - 22 working days

Digital signal processing is an area of science and engineering that has been developed rapidly over the past years. This rapid development is the result of the significant advances in digital computer technology and integrated circuits fabrication. Many of the signal processing tasks conventionally performed by analog means, are realized today by less expensive and often more reliable digital hardware. Multirate Systems: Design and Applications addresses the rapid development of multirate digital signal processing and how it is complemented by the emergence of new applications.

Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover): Chetna Singhal, Swades De Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover)
Chetna Singhal, Swades De
R4,823 Discovery Miles 48 230 Ships in 18 - 22 working days

With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research on upcoming 5G technologies for next generation mobile networks, examining the various features, solutions, and challenges associated with such advances. Highlighting relevant coverage across topics such as energy efficiency, user support, and adaptive multimedia services, this book is ideally designed for academics, professionals, graduate students, and professionals interested in novel research for wireless innovations.

Data Network Engineering (Hardcover, 1999 ed.): Tim King, Dave Newson Data Network Engineering (Hardcover, 1999 ed.)
Tim King, Dave Newson
R4,201 Discovery Miles 42 010 Ships in 18 - 22 working days

It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks. Growth in data-traffic volumes far exceeds that for voice, and is driven by increased use of applications such as e-mail attachments, remote printing and fileserver access, and the now omnipresent World Wide Web. The growth of data networking to connect computers with each other and with their peripheral devices began in earnest in the 1970s, took off in the 1980s and exploded in the 1990s. The early 21st century will see ever faster, more cost effective networks providing flexible data access into ever more businesses and homes. Since the 1970s there have been great advances in technology. For the past twenty years the processing power of computers has continued to grow with no hint of slowing - recall the oft-cited Moore's Law claiming that this power doubles every 18 months. Advances in the data networking equipment required to support the data traffic generated have been enormous. The pace of development from early X. 25 and modem technology through to some of the advanced equipment functionality now available is breathtaking - it is sometimes hard to believe that the practical router is barely ten years old This book provides an overview of the advanced data networking field by bringing together chapters on local area networks, wide area networks and their application."

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,522 R2,415 Discovery Miles 24 150 Save R1,107 (31%) Ships in 10 - 15 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R892 R810 Discovery Miles 8 100 Save R82 (9%) Ships in 18 - 22 working days
Technological Advancements and the Impact of Actor-Network Theory (Hardcover): Arthur Tatnall Technological Advancements and the Impact of Actor-Network Theory (Hardcover)
Arthur Tatnall
R4,801 Discovery Miles 48 010 Ships in 18 - 22 working days

Actor-Network Theory (ANT) has existed as a topic of interest among social theorists for decades. Due to the prevalence of technology in modern society, discussions over the influence of actor-network theory on the changing scope of technology can assist in facilitating further research and scientific thought. Technological Advancements and the Impact of Actor-Network Theory focuses on cross-disciplinary research as well as examples of the use of actor-network theory in a variety of fields, including medicine, education, business, engineering, environmental science, computer science, and social science. This timely publication is well-suited for reference use by academicians, researchers, upper-level students, and theorists. Topics Covered The many academic areas covered in this publication include, but are not limited to: Digital Communication E-Health Human Interaction Information and Communication Technologies Online Education Online Investing Public Service Innovation Software Development

Grid and Services Evolution (Hardcover, 2009 ed.): Norbert Meyer, Domenico Talia, Ramin Yahyapour Grid and Services Evolution (Hardcover, 2009 ed.)
Norbert Meyer, Domenico Talia, Ramin Yahyapour
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain, June 5-6, 2008.

Grid and Services Evolution provides a bridge between the application community and the developers of middleware services, especially in terms of parallel computing. This edited volume brings together a critical mass of well-established researchers worldwide, from forty-two institutions active in the fields of distributed systems and middleware, programming models, algorithms, tools and environments.

Grid and Services Evolution is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.

Recent Progress in Biometrics (Hardcover): Jose Mabry Recent Progress in Biometrics (Hardcover)
Jose Mabry
R3,031 R2,746 Discovery Miles 27 460 Save R285 (9%) Ships in 18 - 22 working days
Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017): H. R. Vishwakarma, Shyam Akashe Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R6,473 Discovery Miles 64 730 Ships in 10 - 15 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,424 R1,924 Discovery Miles 19 240 Save R1,500 (44%) Ships in 10 - 15 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International... Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International Workshop on Protocols for High-Speed Networks (PfHSN '99) August 25-27, 1999, Salem, Massachusetts, USA (Hardcover, 2000 ed.)
Joseph D. Touch, James P.G. Sterbenz
R5,300 Discovery Miles 53 000 Ships in 18 - 22 working days

1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem Massachusetts 6,000 kilometers away and 10 years later, in its sixth incarnation, but still with a waterfront view (the Atlantic Ocean). In between, it has visited some picturesque views of other lakes and bays of the world: Palo Alto (1990 - San Francisco Bay), Stockholm (1993 - Baltic Sea), Vancouver (1994- the Strait of Georgia and the Pacific Ocean), and Sophia Antipolis I Nice (1996- the Mediterranean Sea). PfHSN is a workshop providing an international forum for the exchange of information on high-speed networks. It is a relatively small workshop, limited to 80 participants or less, to encourage lively discussion and the active participation of all attendees. A significant component of the workshop is interactive in nature, with a long history of significant time reserved for discussions. This was enhanced in 1996 by Christophe Diot and W allid Dabbous with the institution of Working Sessions chaired by an "animator," who is a distinguished researcher focusing on topical issues of the day. These sessions are an audience participation event, and are one of the things that makes PfHSN a true "working conference."

Amazon CloudSearch Developer Guide (Hardcover): Documentation Team Amazon CloudSearch Developer Guide (Hardcover)
Documentation Team
R1,721 Discovery Miles 17 210 Ships in 18 - 22 working days
Cloud Computing: A Futuristic Approach (Hardcover): Amanda Wegener Cloud Computing: A Futuristic Approach (Hardcover)
Amanda Wegener
R3,233 R2,928 Discovery Miles 29 280 Save R305 (9%) Ships in 18 - 22 working days
Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and... Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and Networks (CECNet 2015) (Hardcover, 1st ed. 2016)
Amir Hussain
R7,637 R6,451 Discovery Miles 64 510 Save R1,186 (16%) Ships in 10 - 15 working days

This book comprises peer-reviewed contributions presented at the 5th International Conference on Electronics, Communications and Networks (CECNet 2015), held in Shanghai, China, 12-15 December, 2015. It includes new multi-disciplinary topics spanning a unique depth and breadth of cutting-edge research areas in Electronic Engineering, Communications and Networks, and Computer Technology. More generally, it is of interest to academics, students and professionals involved in Consumer Electronics Technology, Communication Engineering and Technology, Wireless Communication Systems and Technology, and Computer Engineering and Technology.

Communications in Interference Limited Networks (Hardcover, 1st ed. 2016): Wolfgang Utschick Communications in Interference Limited Networks (Hardcover, 1st ed. 2016)
Wolfgang Utschick
R4,942 Discovery Miles 49 420 Ships in 10 - 15 working days

This book offers means to handle interference as a central problem of operating wireless networks. It investigates centralized and decentralized methods to avoid and handle interference as well as approaches that resolve interference constructively. The latter type of approach tries to solve the joint detection and estimation problem of several data streams that share a common medium. In fact, an exciting insight into the operation of networks is that it may be beneficial, in terms of an overall throughput, to actively create and manage interference. Thus, when handled properly, "mixing" of data in networks becomes a useful tool of operation rather than the nuisance as which it has been treated traditionally. With the development of mobile, robust, ubiquitous, reliable and instantaneous communication being a driving and enabling factor of an information centric economy, the understanding, mitigation and exploitation of interference in networks must be seen as a centrally important task.

Architecting the Internet of Things (Hardcover, 2011 Ed.): Dieter Uckelmann, Mark Harrison, Florian Michahelles Architecting the Internet of Things (Hardcover, 2011 Ed.)
Dieter Uckelmann, Mark Harrison, Florian Michahelles
R4,005 Discovery Miles 40 050 Ships in 10 - 15 working days

Many of the initial developments towards the Internet of Things have focused on the combination of Auto-ID and networked infrastructures in business-to-business logistics and product lifecycle applications. However, the Internet of Things is more than a business tool for managing business processes more efficiently and more effectively it will also enable a more convenient way of life.

Since the term "Internet of Things" first came to attention when the Auto-ID Center launched their initial vision for the EPC network for automatically identifying and tracing the flow of goods within supply-chains, increasing numbers of researchers and practitioners have further developed this vision.

The authors in this book provide a research perspective on current and future developments in the Internet of Things. The different chapters cover a broad range of topics from system design aspects and core architectural approaches to end-user participation, business perspectives and applications.

DCOM Explained (Paperback): Rosemary Rock-Evans DCOM Explained (Paperback)
Rosemary Rock-Evans
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days

DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM.
This book describes:
. what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling.
. what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network
. how the service could be provided, and what other solutions exist for achieving the same end
. how Microsoft has tackled the problem

Provides a complete, easy to understand, and compact picture of all the services of DCOM
Written from a designer or manager's point of view
Compares DCOM with other middleware"

Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99)... Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99) November 22-26, 1999, Pathumthani, Thailand (Hardcover, 2000 ed.)
Thongchai Yongchareon, Finn Arve Aagesen, Vilas Wuwongse
R5,400 Discovery Miles 54 000 Ships in 18 - 22 working days

Intelligence in Networks is a concept, the meaning of which is highly related to the time-period when it is used. In the 1960s, 1970s and 1980s, it was mainly related to the teleservice repertoire `an sich'. In the 1990s, it is more related to efficient flexibility in the introduction of new teleservices and teleservice repertoire. This state-of-the-art text sets out to identify and study issues related to solutions for increasing intelligence in networks. As examples, intelligence networks (IN), telecommunication information networking architecture (TINA) and mobile agents and active networks are different solutions for improving the grade of network intelligence. The areas under discussion include research and development within various closely related fields such as: Teleservices, service architecture and service creation; Middleware and specification languages; Mobile agents, active networks, plug-and-play issues; and Quality of service and performance.GBP/LISTGBP Intelligence in Networks contains the proceedings of SMARTNET'99, the fifth in a series of conferences on intelligence in networks sponsored by the International Federation for Information Processing (IFIP), at the Asian Institute of Technology, Pathumthani, Thailand in November 1999.

Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018): Punnarumol Temdee,... Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018)
Punnarumol Temdee, Ramjee Prasad
R3,246 Discovery Miles 32 460 Ships in 18 - 22 working days

This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, modelling, reasoning, and distribution of context. It also reviews applications of context-aware computing - both past and present - to offer readers the knowledge needed to critically analyse how context awareness can be put to use. It is particularly to those new to the subject area who are interested in learning how to develop context-aware computing-oriented applications, as well as postgraduates and researchers in computer engineering, communications engineering related areas of information technology (IT). Further it provides practical know-how for professionals working in IT support and technology, consultants and business decision-makers and those working in the medical, human, and social sciences.

Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and... Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and Modelling (ONDM'98) February 9-11, 1998 Rome, Italy (Hardcover, 1999 ed.)
Giancarlo De Marchis, Roberto Sabella
R2,678 Discovery Miles 26 780 Ships in 18 - 22 working days

Optical Network Design and Modelling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail:
-- Routing strategies and algorithms for optical networks; -- Network planning and design; -- Wavelength conversion and wavelength assignment in optical networks; -- Technologies for optical networks (transport, access and local area networks); -- Transmission aspects in wide area optical networks; -- New paradigms for traffic modelling.

This book contains the selected proceedings of the Second International Working Conference on Optical Network Design and Modelling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 1998, in Rome, Italy.

This valuable new book will be essential reading for personnel in computer/communication industries, and for academic and research staff in computer science and electrical engineering.

Internet Protocol-based Emergency Services (Hardcover): H Tschofenig Internet Protocol-based Emergency Services (Hardcover)
H Tschofenig
R2,350 Discovery Miles 23 500 Ships in 18 - 22 working days

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: * Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them * Focuses on SIP and IMS-based communication systems for the Internet * Covers standards, architecture and deployment issues * International focus, with coverage of the major national efforts in this area * Written by the experts who were/are involved in the development of the standards (NENA, EENA, 3GPP, IETF, ETSI, etc.) * Accompanying website provides updates on standards and deployment (http://ip-emergency.net) This book is an excellent resource for vendors building software and equipment for emergency services, engineers/researchers engaged in development of networks and network elements and standardization, emergency services providers, standardization experts, product persons, those within the regulatory environment. Students and lecturers, infrastructure and application service providers will also find this book of interest.

Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.): Xavier Lagrange, Bijan... Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.)
Xavier Lagrange, Bijan Jabbari
R4,206 Discovery Miles 42 060 Ships in 18 - 22 working days

Third generation networks have been specified and are now being deployed in a few countries. They are expected to reach maturity in the next several years and to provide various services including audio, video, and world wide web browsing. Furthermore, radio terminals are expected to be integrated in a number of devices such as personal computers, personal digital assistants, and even television sets. Such a wide-usage of radio mandates ongoing research to address design of networks with high capacity while providing acceptable quality of service. Included in Multiaccess, Mobility and Teletraffic for Wireless Communications: Volume 6 are new results on the optimization of protocols in third generation systems. The radio channel is dynamically shared among several users using packet access, it must adapt to a varying number of users and accomodate various services. Several chapters deal with radio resource management and packet access both in second and third generation systems. The book also considers the performance of low layer protocols (MAC/RLC) and transport protocols (e.g., TCP) when they are combined to offer data services. IPv6 will probably be an in-use network protocol in the near future. It must efficiently manage mobility and support multimedia flows. Wireless internet is an important area and related topics are included in this book. The improvement of the network performance relies on a sophisticated and optimized physical layer. The book includes studies on joint multiple access detection, MIMO systems, use of turbo-codes and methods to improve the analysis of the channel capacity. The book also covers location management, handoff optimization, multi-hop networks andnetwork management. Mobility and Teletraffic for Wireless Communications: Volume 6 is an important book for researchers, students and professionals working in the area of wireless communications and mobile computing.

IM Instant Messaging Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP IM Instant Messaging Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,104 Discovery Miles 21 040 Ships in 10 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Cross-Media Service Delivery (Hardcover, 2003 ed.): Diomidis Spinellis Cross-Media Service Delivery (Hardcover, 2003 ed.)
Diomidis Spinellis
R4,141 Discovery Miles 41 410 Ships in 18 - 22 working days

Cross-Media Service Delivery is of interest to professionals and academicians working in content authoring and electronic publishing platforms; as well as in media and broadcasting.
The digitization of traditional media formats, such as text, images, video, and sound provides us with the ability to store, process, and transport content in a uniform way. This has led the formerly distinct industries of media, telecommunications, and information technology to converge. Cross-media publishing and service delivery are important new trends emerging in the content industry landscape. Mass-media organizations and content providers transitionally targeted content production towards a single delivery channel. However, recent economic and technological changes in the industry led content providers to extend their brands to cover multiple delivery channels. Following the content industry trend to "create once and publish everywhere" - COPE, a number of architectures, technologies, and tools are currently being developed and deployed to facilitate the automatic conversion of content to multiple formats, and the creation of innovative multi-platform services. This new approach enables the seamless access to information over different network infrastructures and client platforms.
This work uniquely brings together a cross-disciplinary core of contributors to address the technical and business issues of cross-media publishing and service delivery. The contributions are organized into four different areas: the business issues driving the requirements for cross media content delivery, the architectures used for delivering content to multiple platforms, technologies that address specificpractical problems, and, last but not least, concrete applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Greatest Knight - The Story of…
Elizabeth Chadwick Paperback  (2)
R883 Discovery Miles 8 830
How to NOT Suck at Presentations
Fern Chan Paperback R341 R318 Discovery Miles 3 180
Remote Usability Testing - Actionable…
Inge De Bleecker, Rebecca Okoroji Paperback R780 Discovery Miles 7 800
Alabama Lore - The Choccolocco Monster…
Wil Elrick Paperback R520 R479 Discovery Miles 4 790
Blood On Her Hands - South Africa's Most…
Tanya Farber Paperback R300 R268 Discovery Miles 2 680
Just Be Held - Trusting the Lord with…
Hank Leo Hardcover R638 R572 Discovery Miles 5 720
26/11 Braveheart - My Encounter with…
Praveen Kumar Teotia Paperback R528 Discovery Miles 5 280
Stand to - Finding Masculine Courage in…
Shawn Brower Paperback R376 R355 Discovery Miles 3 550
You're being ridiculous! - The fun and…
C.E.A. Forster Paperback R313 Discovery Miles 3 130
Financial Analysis With Microsoft Excel
Timothy Mayes Paperback R1,339 R1,257 Discovery Miles 12 570

 

Partners